A: The customer (end user) owns the data, and SudoTouch makes no claim of ownership to it. Once the application is deployed, all data is controlled by the owning enterprise. We don’t need or want to restrict/control the data your enterprise utilizes. We do not sell your data. Actually, we intentionally engineer the application so that the operational data is restricted or not visible to our team members who may be providing technical support.
End user data can be extracted and utilized according to the customer’s needs, and we can customize this output as the user sees fit. This enables the enterprise to utilize the vendor best suited to solve unique operational problems.
A: Applications are engineered to augment your ability to do your job! Software applications can provide PDF outputs with the data populated on the official form should it be required.
A: Applications are hosted in the government cloud and are subject to operational review and control by DoD Platform One.
From the first written line of computer code, the codebase for all applications is ran directly through automated scanning processes owned exclusively by the DoD. This process looks for things like malicious logic, errors in coding, etc.
Comparing software development to the manufacturing of a GSA security container (safe) for a SCIF or secure room is a good analogy to understand this process. When a GSA container is built, the facility is authorized to do so by the GSA. The container is constructed with specified standards by authorized people. Once it is deployed an authorized working environment, the end user puts material in it. An authorized repair technician may be contacted for assistance as required.
Software development and deployment for the DoD follows a similar path. The applications are constructed congruent with DoD standards by authorized people with the appropriate background check or clearance (if applicable). The software is given ATO by the appropriate DoD agency. After construction, the application is deployed to an authorized location. Visibility of data is restricted to authorized end users, but a software engineer may be contacted for assistance as required.
A: If you want the application to “talk” to other software within your enterprise (API), we can easily make it work assuming the following conditions are met:
– Cybersecurity requirements do not prohibit the API connection
– The owning agency for the external application authorizes the connection
– The external application has an API that allows the connection
A: It’s not possible to give a universal answer because these highly-specialized applications are specifically customized to fit the needs of your organization, and that’s what makes them so awesome! Rollout time can vary from immediate to several months depending on the complexity and unique attributes of the processes in your organization(s).